diff options
Diffstat (limited to 'common/recipes-kernel/linux/linux-yocto-4.9.21/0035-x86-spectre-Fix-spelling-mistake-vunerable-vulnerabl.patch')
-rw-r--r-- | common/recipes-kernel/linux/linux-yocto-4.9.21/0035-x86-spectre-Fix-spelling-mistake-vunerable-vulnerabl.patch | 41 |
1 files changed, 0 insertions, 41 deletions
diff --git a/common/recipes-kernel/linux/linux-yocto-4.9.21/0035-x86-spectre-Fix-spelling-mistake-vunerable-vulnerabl.patch b/common/recipes-kernel/linux/linux-yocto-4.9.21/0035-x86-spectre-Fix-spelling-mistake-vunerable-vulnerabl.patch deleted file mode 100644 index 6308fc6d..00000000 --- a/common/recipes-kernel/linux/linux-yocto-4.9.21/0035-x86-spectre-Fix-spelling-mistake-vunerable-vulnerabl.patch +++ /dev/null @@ -1,41 +0,0 @@ -From 5f49c69f0110c99880f0d85cf96e7cc60acd4987 Mon Sep 17 00:00:00 2001 -From: Colin Ian King <colin.king@canonical.com> -Date: Tue, 30 Jan 2018 19:32:18 +0000 -Subject: [PATCH 35/42] x86/spectre: Fix spelling mistake: "vunerable"-> - "vulnerable" - -(cherry picked from commit e698dcdfcda41efd0984de539767b4cddd235f1e) - -Trivial fix to spelling mistake in pr_err error message text. - -Signed-off-by: Colin Ian King <colin.king@canonical.com> -Signed-off-by: Thomas Gleixner <tglx@linutronix.de> -Cc: Andi Kleen <ak@linux.intel.com> -Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org> -Cc: kernel-janitors@vger.kernel.org -Cc: Andy Lutomirski <luto@kernel.org> -Cc: Borislav Petkov <bp@suse.de> -Cc: David Woodhouse <dwmw@amazon.co.uk> -Link: https://lkml.kernel.org/r/20180130193218.9271-1-colin.king@canonical.com -Signed-off-by: David Woodhouse <dwmw@amazon.co.uk> -Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> ---- - arch/x86/kernel/cpu/bugs.c | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/arch/x86/kernel/cpu/bugs.c b/arch/x86/kernel/cpu/bugs.c -index d4658e0..aec7daf 100644 ---- a/arch/x86/kernel/cpu/bugs.c -+++ b/arch/x86/kernel/cpu/bugs.c -@@ -102,7 +102,7 @@ bool retpoline_module_ok(bool has_retpoline) - if (spectre_v2_enabled == SPECTRE_V2_NONE || has_retpoline) - return true; - -- pr_err("System may be vunerable to spectre v2\n"); -+ pr_err("System may be vulnerable to spectre v2\n"); - spectre_v2_bad_module = true; - return false; - } --- -2.7.4 - |